NIST 800-53 REV 5 • ACCESS CONTROL
AC-7(1) — Automatic Account Lock
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
This enhancement makes the lockout automatic — the system must handle it without needing a human to intervene. When the threshold is hit, the account locks immediately.
Example 1: The same GPO settings from AC-7 handle this — Windows automatically locks the account after the configured number of failed attempts. Verify it is working by checking Event ID 4740 (account lockout) in the Security log on your domain controllers.
Example 2: On Linux, configure /etc/pam.d/common-auth (or system-auth) with the pam_tally2 or pam_faillock module: auth required pam_faillock.so deny=5 unlock_time=1800. This locks the account for 30 minutes after 5 failed attempts, and it happens automatically at the PAM level.